Exploit kit use is on the rise again as indicated by the latest Infoblox DNS Threat Index report which shows a 75% increase in exploit kit related activity in Q3 2015, compared to the same quarter in 2014. Here we look at five reasons why exploit kits are a highly dangerous cyber threat.

Without proper security measures, users risk losing both their personal data and confidential data from work once their mobile device is compromised. In light of this, Parvinder Walia, Sales and Marketing Director at ESET, Asia Pacific, shares 5 things to look out for in order to find out if your phone has been compromised.

BLOGS AND OPINIONS

SECURITY HARDWARE AND SOFTWARE WHITE PAPERS

This white paper explains how connecting a DLP system to an access governance solution can enable organisations to make informed decisions, appropriately evaluate and manage risk, and obtain maximum benefit from their chosen DLP solution.

In today’s environment, you don’t have much time to react to business situations. Performance is critical. If you can do things more quickly, you can get answers faster, and be more agile and productive.

With the challenges of sovereign debt, economic malaise, youth unemployment, resource scarcity, we may need to rethink and rebuild many of the organisations and industries that have served us well for decades, but have reached the end of their life cycles.